Resources banner

Title - Resources Page

PROOFPOINT

Resources

Resources

Advanced options

TAP Mobile Defense - Video Overview

TAP Mobile Defense - Video Overview

Video

Learn how TAP Mobile Defense provides visibility and automated workflow for managing risk in your environment.

A CISO's Guide to Phishing and Malware

A CISO's Guide to Phishing and Malware

A CISO's Guide to Phishing and Malware

White Paper

In this eBook from SecurityCurrent, Joel Rosenblatt, director of information security for Columbia University, explores real-world examples of advanced targeted attacks via email and social media demonstrating how these evolving threats are increasing an organization's business risks.

Automate Your Social Media Compliance Auditing

Automate Your Social Media Compliance Auditing

Automate Your Social Media Compliance Auditing

Video

Get a detailed look at how Proofpoint Social Discover can help you detect, audit, and archive social media content.

 

Gartner Research – Fighting Phishing: Optimize your Defense

Gartner Research – Fighting Phishing: Optimize your Defense

Gartner Research – Fighting Phishing: Optimize your Defense

White Paper

Download this Gartner Research report and learn effective strategies to negotiate, design and maintain an anti-phishing program. 

The Impostor in the Machine

The Impostor in the Machine

The Impostor in the Machine

White Paper

Learn how Proofpoint Enterprise Protection employs our dynamic classifier and quarantine functionality to allow you to quickly see, report and stop an Impostor Email attack technique.

Proofpoint Solving Archiving Challenges

Proofpoint Solving Archiving Challenges

Proofpoint Solving Archiving Challenges

Video

Solve your biggest archiving challenges. Track, classify, and control your data for streamlined discovery, simplified regulatory compliance, and fast access. Watch this video to learn about Proofpoint Archiving Solutions.

Longlining Phishing Attacks - Video Overview

Longlining Phishing Attacks - Video Overview

Longlining Phishing Attacks - Video Overview

Video

This video provides a detailed look at how attackers evolved traditional phishing attacks into industrial-scale campaigns.

Just the Facts: Postini to Proofpoint Transition

Just the Facts: Postini to Proofpoint Transition

Just the Facts: Postini to Proofpoint Transition

Video

Learn more about the transition from Postini to Proofpoint.

Proofpoint SecureShare - Video Overview

Proofpoint SecureShare - Video Overview

Video

Proofpoint SecureShare is a cloud-based solution designed to enable enterprise users to securely exchange large files with ease, while staying compliant with enterprise data policies.

Proofpoint Enterprise Archive Social Platform - Chatter Video Overview

Proofpoint Enterprise Archive Social Platform - Chatter Video Overview

Proofpoint Enterprise Archive Social Platform - Chatter Video Overview

Video

Learn how Proofpoint extends its archiving capabilities to capture Chatter social feeds. 

Proofpoint Enterprise Archive Social Platform - Yammer Video Overview

Proofpoint Enterprise Archive Social Platform - Yammer Video Overview

Proofpoint Enterprise Archive Social Platform - Yammer Video Overview

Video

Learn how Proofpoint extends its archiving capabilities to capture Yammer social feeds.

Proofpoint Predictive Analytics - Video Overview

Proofpoint Predictive Analytics - Video Overview

Proofpoint Predictive Analytics - Video Overview

Video

Get a detailed look at how Proofpoint Predictive Defense sandboxes malicious URLs before users can click. 

Proofpoint Targeted Attack Protection Dashboard - Video Overview

Proofpoint Targeted Attack Protection Dashboard - Video Overview

Proofpoint Targeted Attack Protection Dashboard - Video Overview

Video

Watch a comprehensive view of the Targeted Attack Protection dashboard in action. 

Proofpoint Locky Demo

Proofpoint Locky Demo

Video

Learn how "Locky", a new ransomware delivered by the same actor behind many of the Dridex campaigns, is distributed via MS Word documents with malicious macros. 

How Phishing Works - Video Overview

How Phishing Works - Video Overview

Video

Learn how attackers utilize a compromised website to infiltrate your computer, steal your personal information and attack other computers.

Proofpoint Example of Hack Speed

Proofpoint Example of Hack Speed

Video

Learn how hackers can infiltrate your computer in seconds.

Enterprise Threat Protection - Video Overview

Enterprise Threat Protection - Video Overview

Enterprise Threat Protection - Video Overview

Video

Learn about the costly consequences of data breaches, and how targeted attacks are becoming more sophisticated.

Targeted Attack Protection Video Testimonial - Zions Bank

Targeted Attack Protection Video Testimonial - Zions Bank

Targeted Attack Protection Video Testimonial - Zions Bank

Video

Learn how Zions Bank uses Proofpoint to stop spam, encrypt email and protect customer financial information.

Enterprise Archive Video Testimonial - Graubard Miller

Enterprise Archive Video Testimonial - Graubard Miller

Enterprise Archive Video Testimonial - Graubard Miller

Video

Discover how Graubard Miller met its email archiving and eDiscovery requirements after deploying Proofpoint solutions.

Enterprise Protection and Privacy Video Testimonial - University of Chicago Medical Center

Enterprise Protection and Privacy Video Testimonial - University of Chicago Medical Center

Enterprise Protection and Privacy Video Testimonial - University of Chicago Medical Center

Video

Learn how the University of Chicago Medical Center deployed Proofpoint appliances for email security, monitoring, and routing. 

Enterprise Protection and Sentrion Sendmail Video Testimonial - Swisscom

Enterprise Protection and Sentrion Sendmail Video Testimonial - Swisscom

Enterprise Protection and Sentrion Sendmail Video Testimonial - Swisscom

Video

Learn how Swisscom utilized Proofpoint's solutions to manage four million mailboxes and to protect the company from phishing attacks.

Enterprise Privacy Video Testimonial - Simply Health

Enterprise Privacy Video Testimonial - Simply Health

Enterprise Privacy Video Testimonial - Simply Health

Video

Control and protect information that leaves your organization in e-mails, social media and file sharing.

Enterprise Archive Video Testimonial - Royal Mail Group

Enterprise Archive Video Testimonial - Royal Mail Group

Enterprise Archive Video Testimonial - Royal Mail Group

Video

Learn how Royal Mail Group increased efficiency and reduced costs with Proofpoint's archiving solutions.

Enterprise Protection and Prviacy Video Testimonial - Petco

Enterprise Protection and Prviacy Video Testimonial - Petco

Enterprise Protection and Prviacy Video Testimonial - Petco

Video

Discover how Petco leveraged Proofpoint's cloud solutions to meet compliance regulations, scan outbound emails, and quickly encrypt emails.

Enterprise Protection, Privacy and Archive Video Testimonial - MED3000

Enterprise Protection, Privacy and Archive Video Testimonial - MED3000

Enterprise Protection, Privacy and Archive Video Testimonial - MED3000

Video

Learn how MED3000 met their compliance and infrastructure needs with Proofpoint's security and archive solutions.

Enterprise Protection Video Testimonial - City University of New York

Enterprise Protection Video Testimonial - City University of New York

Enterprise Protection Video Testimonial - City University of New York

Video

Learn how City University of New York uses Proofpoint Enterprise Protection for email, secure communication and email policy enforcement.

Cyber Security Investment - Aspen Insurance Video Testimonial

Cyber Security Investment - Aspen Insurance Video Testimonial

Cyber Security Investment - Aspen Insurance Video Testimonial

Video

Cyber security investments can create a platform to engage and influence businesses as they become more aware of cyber threats.

Archive & Governance Video Testimonial - Aon Corporation

Archive & Governance Video Testimonial - Aon Corporation

Archive & Governance Video Testimonial - Aon Corporation

Video

Learn how Aon Corporation uses Proofpoint's Archiving & Governance to gain more flexibility for email archiving and improved eDiscovery.

Enterprise Privacy Video Testimonial - Amalgamated Life

Enterprise Privacy Video Testimonial - Amalgamated Life

Enterprise Privacy Video Testimonial - Amalgamated Life

Video

Learn how Amalgamated Life extended its secure e-mail capabilities with Proofpoint Enterprise Privacy.

Enterprise Protection Video Testimonial - Amway/Alticor

Enterprise Protection Video Testimonial - Amway/Alticor

Enterprise Protection Video Testimonial - Amway/Alticor

Video

Learn how Amway/Alticor leveraged Proofpoint Enterprise Protection to achieve its security goals. 

Credential Phishing: Hook, Line, and Sinker

Credential Phishing: Hook, Line, and Sinker

Credential Phishing: Hook, Line, and Sinker

White Paper

Discover how Phishing has changed. Your people are now the primary target. Learn how your organization can detect, mitigate and stop credential phishing attacks before they succeed.

Why Proofpoint - Video Overview

Why Proofpoint - Video Overview

Why Proofpoint - Video Overview

Video

Learn how Proofpoint protects organizations from advanced attacks that target email, mobile apps, and social media, often stopping attacks before they reach their target on any network or device.

Threat Response - Video Overview

Threat Response - Video Overview

Video

Learn how Proofpoint's Threat Response enables organizations to verify, prioritize, and contain advanced threats and targeted attacks.

Social Media Security - Video Overview

Social Media Security - Video Overview

Video

Learn how companies need to protect their growing social media programs, brand image and avoid costly compliance violations and audits.

Proofpoint Advanced Threat Protection

Proofpoint Advanced Threat Protection

Video

Learn how Proofpoint’s next-generation cyber security solutions can help protect the information your people create against phishing, malware, and emerging threats before they happen. 

Proofpoint By The Numbers Video

Proofpoint By The Numbers Video

Video

The numbers speak for themselves. Learn how Proofpoint detects, catches, and blocks today's advanced threats and email-borne attacks.

Secure Office 365 With Proofpoint - Video Overview

Secure Office 365 With Proofpoint - Video Overview

Secure Office 365 With Proofpoint - Video Overview

Video

Learn how the Proofpoint Advanced Threat Platform safeguards Office 365 and provides the tools and insight for rapid response.

Are You Prepared for a Data Breach?

Are You Prepared for a Data Breach?

Video

Learn more about the financial costs of a data breach and how Proofpoint can protect you and your organization from being hacked.

Archive & Governance - Solution Overview

Archive & Governance - Solution Overview

Video

Learn more about Proofpoint's archive and governance solutions that address email storage management, eDiscovery, and regulatory compliance challenges.

Is Microsoft Office 365 Secure?

Is Microsoft Office 365 Secure?

Is Microsoft Office 365 Secure?

Infographic

The world is moving to Office 365. Don’t leave security, compliance and control up in the air. Download our infographic to get a quick glimpse into the data from our Office 365 research and learn about the top security, encryption, and archiving challenges when moving to the cloud.

Advanced Threat Protection Enables Business eBook

Advanced Threat Protection Enables Business eBook

Advanced Threat Protection Enables Business eBook

White Paper

Discover how stopping advanced threats protects data and the people who create it—so they have the freedom to continue innovating and connecting, moving business forward.

Proofpoint Threat Report (December 2015)

Proofpoint Threat Report (December 2015)

Proofpoint Threat Report (December 2015)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Critical Capabilities for Enterprise Information Archiving

Critical Capabilities for Enterprise Information Archiving

Critical Capabilities for Enterprise Information Archiving

White Paper

Download this new Gartner report, Critical Capabilities for Enterprise Information Archiving, to learn more about key findings, recommendations and what you need to know when deploying an enterprise archive solution.

SANS Institute’s Spearphishing Survival Guide

SANS Institute’s Spearphishing Survival Guide

SANS Institute’s Spearphishing Survival Guide

White Paper

In the SANS Spearphishing Survival Guide, the SANS Institute explores advanced email attack progression and the protection and prevention techniques your organization needs to meet the challenge of fighting today’s advanced spearphishing threats.

 

Proofpoint Threat Report | July - September 2015

Proofpoint Threat Report | July - September 2015

Proofpoint Threat Report | July - September 2015

White Paper


Threat Report July - September 2015
The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the customer base and the wider marketplace.

 

The True ROI of Information Governance

The True ROI of Information Governance

The True ROI of Information Governance

White Paper

Whitepaper by Osterman Research goes over the difficulty in making information governance effective and how to address those issues.

 

Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps

Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps

Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps

White Paper

App stores cannot protect enterprises from malicious and dangerous apps. Learn why these apps continue to be available on the major apps stores, for both iOS and Android, and why this will continue to be the case.

The Value of Integrated Mobile, Social and Email Threat Defense

The Value of Integrated Mobile, Social and Email Threat Defense

The Value of Integrated Mobile, Social and Email Threat Defense

White Paper

Download this research paper to learn how & why mobile, social and email threat vectors relate to each other from a security perspective and what you can do to make sure your organization is fully protected.

Making Strategic investments to Safeguard Against Modern Threats

Making Strategic investments to Safeguard Against Modern Threats

Making Strategic investments to Safeguard Against Modern Threats

Threat Report

Download this research paper from Proofpoint and the Center for Digital Government and learn how to stay up-to-date against today's cyber threats. 

Proofpoint Threat Report (September 2015)

Proofpoint Threat Report (September 2015)

Proofpoint Threat Report (September 2015)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.